Sciweavers

29 search results - page 6 / 6
» Preventing Information Leaks through Shadow Executions
Sort
View
CJ
2010
150views more  CJ 2010»
13 years 2 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
IJSWIS
2007
113views more  IJSWIS 2007»
13 years 5 months ago
A Formal Foundation for Ontology-Alignment Interaction Models
Ontology alignment foundations are hard to find in the literature. The abstract nature of the topic and the diverse means of practice make it difficult to capture it in a universal...
W. Marco Schorlemmer, Yannis Kalfoglou, Manuel Ate...
EIT
2008
IEEE
13 years 12 months ago
Architectural support for securing application data in embedded systems
—The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the sy...
Olga Gelbart, Eugen Leontie, Bhagirath Narahari, R...
HPDC
2010
IEEE
13 years 6 months ago
Performance analysis of dynamic workflow scheduling in multicluster grids
Scientists increasingly rely on the execution of workflows in grids to obtain results from complex mixtures of applications. However, the inherently dynamic nature of grid workflo...
Omer Ozan Sonmez, Nezih Yigitbasi, Saeid Abrishami...